Can anyone help me decipher the following report:
+ Target Port: 80
+ Start Time: 2015-11-08 17:33:48 (GMT-5)
---------------------------------------------------------------------------
+ Server: Microsoft-IIS/7.5
+ Cookie ASPSESSIONIDSCTDBSSR created without the http only flag
+ Retrieved x-powered-by header: ASP.NET
+ The anti-click jacking X-Frame-Options header is not present.
+ Retrieved x-aspnet-version header: 2.0.50727
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Server banner has changed from 'Microsoft-IIS/7.5' to 'Microsoft-HTTPAPI/2.0'
which may suggest a WAF, load balancer or proxy is in place
+ Multiple index files found: index.pl, index.asp
+ Retrieved ms-author-via header: DAV
+ Retrieved DAV header: 1
+ Uncommon header 'ms-author-via' found, with contents: DAV
+ Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST, COPY, PROPFIND
+ Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST, PROPFIND, PROPPATCH, MKCOL, PUT, DELETE, COPY, MOVE
+ OSVDB-397: HTTP method ('Public' Header): 'PUT' method could allow clients to
save files on the web server.
+ OSVDB-5646: HTTP method ('Public' Header): 'DELETE' may allow clients to remove files on the web server.
+ OSVDB-5647: HTTP method ('Public' Header): 'MOVE' may allow clients to change
file locations on the web server.
+ WebDAV enabled (COPY MKCOL PROPPATCH PROPFIND listed as allowed)
+ OSVDB-4598: /patients13/members.asp?SF=%22;}alert(223344);function%20x(){v%20=
%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (X
SS).
http://www.cert.org/advisories/CA-2000-02.html.
+ OSVDB-2946: /patients13/forum_members.asp?find=%22;}alert(9823);function%20x()
{v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS).
http://www.cert.org/advisories/CA-2000-02.html.
+ OSVDB-4231: /patients13/uXHql.xml: Coccoon from Apache-XML project reveals file system path in error messages.
+ OSVDB-5692: /patients13/oekaki/: The PaintBBS Server may allow unauthorized access to the config files.
+ 6544 items checked: 0 error(s) and 18 item(s) reported on remote host
+ End Time: 2015-11-08 17:40:27 (GMT-5) (399 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested